Static task
static1
Behavioral task
behavioral1
Sample
35ae3f6517869526394456b6edb2250e_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
35ae3f6517869526394456b6edb2250e_JaffaCakes118
-
Size
511KB
-
MD5
35ae3f6517869526394456b6edb2250e
-
SHA1
f3450b72567f934c0ae9d327e7b3c81740640765
-
SHA256
0283d70c21f41fb8f6672130e2a54ed236c4b345bb695ace50d0ff090f49bb46
-
SHA512
f50a3137f6921f1275d2e6133713fc3a4bdf37b63a2f60f2c68ede3fe8e5cfc206b6e5d2a13b0bdd6fde0d97e67cfe3063eb0fc52af309669090e3f19abc4328
-
SSDEEP
12288:x7LVlG24SKvf3hhpElL9OdQ3LNOuCkiXhlX9QqJ0Zh5:VVlmvf33vxuCkq5aX9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35ae3f6517869526394456b6edb2250e_JaffaCakes118
Files
-
35ae3f6517869526394456b6edb2250e_JaffaCakes118.exe windows:4 windows x86 arch:x86
94400fe3e62cd2376124312fe435b8e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
UpdateWindow
TranslateMessage
ShowWindow
SendMessageA
RegisterClassExA
PostQuitMessage
MessageBoxA
LoadIconA
LoadCursorA
GetMessageA
DispatchMessageA
DefWindowProcA
CreateWindowExA
kernel32
GetModuleHandleA
HeapAlloc
lstrlenA
lstrcpynA
lstrcpyA
lstrcatA
WriteFile
SizeofResource
SetFileAttributesA
RtlMoveMemory
LockResource
LoadResource
LoadLibraryA
CloseHandle
CreateFileA
ExitProcess
FindResourceA
FreeResource
GetCommandLineA
GetEnvironmentVariableA
GetFileSize
GetModuleFileNameA
GlobalFree
GetProcAddress
GetProcessHeap
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
GlobalAlloc
HeapFree
shlwapi
PathFindFileNameA
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 503KB - Virtual size: 503KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE